Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ACFE > Certified Fraud Examiner > CFE-Investigation

CFE-Investigation Certified Fraud Examiner (CFE) - Investigation Question and Answers

Question # 4

Which of the following situations would probably NOT require access to nonpublic records to develop evidence?

A.

Obtaining personal health care records

B.

Accessing banking records to trace assets

C.

Reviewing a company's business filings

D.

Analyzing an individual's personal mobile phone records

Full Access
Question # 5

Which of the following is NOT a step a fraud examiner must take before seizing evidence in a digital forensic investigation?

A.

Obtain and become familiar with any legal orders that apply to the investigation

B.

Assemble an investigation team comprised only of outside digital forensic experts

C.

Ensure that only trained professionals employ any software used in a forensic capacity

D.

Determine whether there are privacy issues related to the item(s) to be searched.

Full Access
Question # 6

Which of the following is usually considered the most useful source of financial information available to fraud examiners in tracing a subject's assets?

A.

Financial institution records

B.

Service bills

C.

Paystubs

D.

Credit card statements

Full Access
Question # 7

Scarlett, a Certified Fraud Examiner (CFE). is assigned to the internal audit department of the ABC Company. She is getting ready to conduct an interview with another company employee who might be involved in a fraud. Which of the following is the MOST APPROPRIATE introduction for Scarlett to use with the employee?

A.

"Hello, my name is Scarlett, and I'm with the ABC Company."

B.

"Hello, my name is Scarlett. I'm an auditor with the ABC Company."

C.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner and an auditor with the ABC Company."

D.

"Hello, my name is Scarlett. I'm a Certified Fraud Examiner with the ABC Company."

Full Access
Question # 8

Elsa, a fraud examiner at ABC Corp., is interviewing Leah, a fraud suspect. Leah allegedly committed a fraud scheme that resulted in a loss of $200,000 for ABC. Elsa asks Leah directly whether she was involved in the fraud. Which of the following responses from Leah is MOST LIKELY an indication that she is being deceptive?

A.

“No, I have never stolen anything from ABC.”

B.

“I had no involvement with the scheme.”

C.

“Why would I do something like that?”

D.

“No, I did not commit fraud against ABC.”

Full Access
Question # 9

Which of the following is NOT an advantage to using link analysis in a fraud investigation?

A.

Link analysis visually displays financial ratio analysis

B.

Link analysis is an affective tool to demonstrate complex networks

C.

Link analysis helps identify indirect relationships with several degrees of separation.

D.

Link analysis allows the investigator to discover patterns in data.

Full Access
Question # 10

Christopher, a fraud examiner, is conducting an admission-seeking interview with Jennifer, an employee suspected of stealing cash. Which of the following is the LEAST EFFECTIVE phrasing for Christopher to use when posing an admission-seeking question to Jennifer?

A.

"Did you steal the money?"

B.

'What did you do with the money?"

C.

"Why did you take the money?"

D.

"How much of the money do you have left?"

Full Access
Question # 11

Cynthia is preparing to conduct a covert investigation. Prior to conducting surveillance of her subject, she creates a memorandum outlining the basis for her operation Which of the following pieces of information should she include in her memorandum?

A.

The name of the subject she will be observing

B.

Her first impression regarding the subject's culpability

C.

The identities of any confidential sources to be used in the operation

D.

All of the above

Full Access
Question # 12

Which of the following questions would be most effective when starting the calibration process during an interview?

A.

"Did you commit any misconduct against the company?"

B.

"Do you know what the punishment is for violations like this'5"

C.

"Do you know who might have defrauded the company?"

D.

"How many jobs have you had before this one?’

Full Access
Question # 13

Which of the following types of information would LEAST LIKELY be found when searching external sources without the subject's consent or a legal order?

A.

A witness's address

B.

Assets owned by a subject

C.

A subject's employee personnel file

D.

A competitor's ownership information

Full Access
Question # 14

Which of the following situations would MOST LIKELY require access to nonpublic records to develop evidence?

A.

Finding out where a person lives

B.

Reviewing an individual's personal mobile phone records

C.

Obtaining a company's business filings

D.

Determining who owns a piece of real estate

Full Access
Question # 15

A fraud examiner is based m the United States, a non-European Union (EU) country, and is collecting personal information from their company's human resources (HR) files about an employee based in Spain, an EU country Based on these facts, the fraud examiner would need to comply with the EU's General Data Protection Regulation (GDPR) when conducting their internal investigation.

A.

True

B.

False

Full Access
Question # 16

Sam needs to obtain the most accurate court records possible in a particular jurisdiction concerning a fraud suspect. The BEST place for Sam to look is a global database that compiles court cases from various jurisdictions

A.

True

B.

False

Full Access
Question # 17

Which of the following is the MOST APPROPRIATE way to document information obtained from social media sites?

A.

Save links of the social media postings and pages in a web browser.

B.

Request a copy of the information from the social media platforms.

C.

Conduct a forensic shutdown of a computer to preserve the metadata from the social media sites and profiles visited.

D.

Download and preserve the information from the social media sites so that it can be established as authentic if used in court.

Full Access
Question # 18

If an important witness becomes hostile and argumentative during an interview, the interviewer should generally.

A.

Avoid reacting to the witness.

B.

Refute the witness's arguments

C.

Try to reason with the witness

D.

Terminate the interview.

Full Access
Question # 19

Which of the following is NOT a function of a fraud examination report?

A.

To convey all the evidence necessary for other parties to thoroughly evaluate the case

B.

To add credibility to the fraud examiner's work

C.

To corroborate previously known facts

D.

To communicate the fraud examiner's qualifications for providing opinions about the case

Full Access
Question # 20

Which of the following is a purpose of an admission-seeking interview?

A.

To establish that the confessor regrets committing the act

B.

To obtain a valid confession from a culpable individual

C.

To verify that the accused mistakenly committed the act

D.

To determine whether the subject's responses are credible

Full Access
Question # 21

Which of the following is TRUE of a follow-up/recommendations section in a written fraud examination report?

A.

A follow-up/recommendations section is not a required part of every written fraud examination report

B.

A follow-up/recommendations section calculates the amount of loss caused by any misconduct identified during the investigation

C.

A follow-up/recommendations section must include a list of organizational failings that contnbuted to the fraud

D.

All of the above

Full Access
Question # 22

Which of the following BEST describes the data analytics approach known as predictive analytics?

A.

The employment of a learning algorithm that identifies similarities, patterns, or anomalies within a data set on its own, without human involvement

B.

The configuration of a business program to emulate and integrate the actions of a human to execute certain business processes thus increasing efficiency and automating repetitive manual tasks

C.

The use of historical data, along with analyses, statistics, and machine learning components, to build a mathematical model that captures important trends and creates a quantitative forecast

D.

The use of layered artificial neural networks to accommodate more data and more sophisticated algorithms to identify complex patterns

Full Access
Question # 23

Boyd, a Certified Fraud Examiner (CFE). was hired to trace Lottie's financial transactions. During his investigation. Boyd obtains records of electronic payments that Lottie made during the past five years. Which of the following are these records MOST LIKELY to reveal?

A.

The market value of any real property Lottie owns

B.

The assets that Lottie has purchased

C.

The division and distribution of Lottie's assets

D.

If Lottie is skimming her employer's funds

Full Access
Question # 24

Fraud examination reports should be written with which of the following audiences in mind?

A.

The media

B.

Opposing legal counsel

C.

Investors and owners

D.

All of the above

Full Access
Question # 25

Which of the following is a reason why a person or organization might engage a fraud examiner to trace illicit transactions?

A.

A victim of fraud wants to facilitate the recovery of criminal proceeds.

B.

An employer wants to know if an employee is falsifying regulatory reports

C.

An attorney wants to evaluate an expert's financial report

D.

An entity needs to find hidden relationships in big data that otherwise would not be discovered.

Full Access
Question # 26

Nobles, a digital forensic examiner for a government agency, is conducting a criminal investigation of Lucas, a construction company executive, for alleged bribery of foreign officials Nobles obtains a court order authorizing him to seize Lucas's personal computer for forensic examination. Which of the following is the MOST ACCURATE statement?

A.

If Lucas's computer is running. Nobles may retrieve data from the computer directly via its normal interface 4 the evidence that he needs exists only in the form of volatile data

B.

If Lucas's computer is off and Nobles needs evidence that exists only in the form of volatile data, he should turn the computer on and retrieve data directly via the computer's normal interlace.

C.

If Lucas's computer is off. Nobles should not turn it on unless he plans to use an encryption device that can guarantee that the system's hard drive will not be accessed during startup.

D.

If Lucas's computer is running. Nobles should perform a graceful shutdown by turning it off using the normal shutdown process

Full Access
Question # 27

Which of the following is the MOST ACCURATE statement about the privacy of information shared through social media?

A.

To access any user-posted information on social media sites, fraud examiners must obtain some type of legal order from the jurisdiction in which the user resides.

B.

A fraud examiner cannot be held liable for violating a user's privacy rights if they hack or break into areas of a social networking site designated as private because all social media information is public.

C.

The Privacy of Social Networks Treaty is a binding international treaty that makes it illegal for law enforcement to seek social media log-in credentials from users.

D.

Hacking or breaking into information on social media sites that is restricted as private could result in liability for fraud examiners due to violation of users' privacy rights.

Full Access
Question # 28

Barnes, a Certified Fraud Examiner (CFE). is using data analysis to identify anomalies that might indicate fraud in XYZ Company's accounts payable transactions. Which of the following is the MOST EFFECTIVE data analysis function that Barnes could use to look for potential fraud in accounts payable?

A.

Compare book and tax depreciation and indicate variances

B.

Identify paycheck amounts over a certain limit

C.

Review recurring monthly expenses and compare to posted/paid invoices

D.

All of the above

Full Access
Question # 29

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Gamma, a fraud suspect. After Beta gave Gamma an appropriate rationalization for his conduct, Gamma continued his denials, giving various alibis. These alibis can usually be diffused by all of the following techniques EXCEPT:

A.

Discussing the testimony of witnesses

B.

Displaying physical evidence

C.

Discussing Gamma's prior deceptions

D.

Downplaying the strength of the evidence

Full Access
Question # 30

Which of the following should be done to prepare an organization for a formal fraud investigation?

A.

Inform the subject that they are under investigation.

B.

Issue an organization-wide communication that notifies all employees about the investigation

C.

Notify all managers about the investigation, explaining why it is happening and who is involved.

D.

Prepare the managers of the employees who will be involved in the investigation

Full Access
Question # 31

Due to risks of illicit transactions, most jurisdictions require financial institutions to obtain information about which of the following from an institution with which they have a foreign correspondent relationship?

A.

The institution's ownership details

B.

The institution's investment portfolio

C.

The institution's client loan profiles

D.

The institution's tax statements

Full Access
Question # 32

Jackson, a Certified Fraud Examiner (CFE). is analyzing Elm Company's accounts payable data to identify anomalies that might indicate fraud. Which of the following is the MOST EFFECTIVE data analysis function that Jackson could use to look for potential fraud in accounts payable?

A.

Compare book and tax depreciation and indicate variances

B.

Identify paychecks with amounts over a certain limit

C.

Summarize large invoices by amount and vendor

D.

All of the above

Full Access
Question # 33

When planning for the interview phase of an investigation, which of the following steps should NOT be taken by the fraud examiner?

A.

Consider what the interview is intended to accomplish and state an objective.

B.

Review the case file to ensure that important information has not been overlooked

C.

Prepare a detailed list of questions to ask the subject during the interview.

D.

Ensure that the interview is held in a venue where the subject will feel Uncomfortable

Full Access
Question # 34

Which of the following can be obtained from a wire transfer record?

A.

The name of the receiving institution's registered agent

B.

The recipient's government identification number

C.

The name of the sender or originator

D.

The sending institution's accreditation type

Full Access
Question # 35

When reporting the results of a fraud examination, it is BEST to include copies (not originals) of important documents in the formal report.

A.

True

B.

False

Full Access
Question # 36

Shannon, a Certified Fraud Examiner (CFE), is conducting a fraud examination for Sand Corp. Shannon is going to perform a textual analysis on unstructured data, such as emails and instant messages. Why would Shannon perform such an analysis?

A.

The analysis will determine whether someone is lying or telling the truth based on clues within the data.

B.

The analysis will uncover an admission of fraud in an email or other communication that can be presented in court.

C.

The analysis will produce a visual representation of the data collected to track the movement of money.

D.

The analysis will categorize data to reveal patterns, sentiments, and relationships that are indicative of fraud.

Full Access
Question # 37

Which of the following questions would be MOST EFFECTIVE when establishing a baseline during an interview?

A.

"Do you know who had access to the file?"

B.

"Are you familiar with the company's policies regarding ethics?"

C.

"Have you committed any misconduct against the company?"

D.

"How long have you been in this department?"

Full Access
Question # 38

Which of the following statements is MOST ACCURATE regarding how a fraud examiner should prepare for an interview with a subject from a different jurisdiction?

A.

Failing to observe cultural norms is not a concern if the interviewer is from a different country than the interviewee.

B.

Consulting with legal counsel is only necessary when an investigation spans multiple

C.

A fraud examiner should find out whether the interviewee can insist upon the presence of a legal representative

D.

A fraud examiner does not need to research cultural considerations such as appropriate greetings and eye contact.

Full Access
Question # 39

Jana. the controller of XYZ Company, notices that the company's hotel expenses increased substantially from the prior year She wants to check to see if this increase is reasonable by comparing hotel expenses from both years to the number of days XYZ"s employees traveled. Which of the following data analysis functions would be the MOST USEFUL in helping Jana analyze these two variables?

A.

Correlation analysis

B.

Duplicate testing

C.

Verifying multiples of a number

D.

Ben ford’s Law analysis

Full Access
Question # 40

Which of the following is the MOST ACCURATE statement about imaging suspect computers' hard drives?

A.

Imaging enables the retrieval of data from the suspect computer directly via its operating system.

B.

Imaging prohibits access to the suspect computer's hard drive by individuals not professionally trained in forensic analysis

C.

Imaging creates pictures of the suspect computer system and its wires and cables

D.

Imaging allows for the analysis of data from a suspect computer without altering or damaging the original data in any way

Full Access
Question # 41

Vishal, a Certified Fraud Examiner (CFE). has just initiated an interview with Steve, a fraud suspect. After a short introduction. Vishal jokes about the fact that he and Steve are wearing the same tie and then proceeds to ask Steve about the previous night's major sporting event Vishal is attempting to

A.

Establish the interview theme

B.

Condition the witness.

C.

Establish rapport

D.

Exhibit passive listening.

Full Access
Question # 42

Which of the following is one of the purposes of closing questions in a routine interview?

A.

To close the interview positively and maintain goodwill

B.

To assess whether the subject is ready to confess

C.

To confirm the credibility of the witness being interviewed

D.

To reduce testimony to a signed, written statement

Full Access
Question # 43

Bobbie, a fraud examiner, is preparing to interview Craig, a close friend and coworker of the primary suspect in the case. Craig has been described by others as "easily angered" and "intense" How should Bobbie approach her interview of Craig?

A.

Provide Craig with plenty of notice prior to the interview to not provoke resentment

B.

Conduct the interview with as little notice as possible so Craig will be unprepared

C.

Ask Craig when ho would prefer to be interviewed in an effort to engender cooperation

D.

Avoid interviewing Craig if possible due to Craig's potential volatility

Full Access
Question # 44

Beta, a Certified Fraud Examiner (CFE). is conducting an admission-seeking interview of Delta, a fraud suspect. In establishing a rationalization. Beta says to Delta. "I know you didn't do this for yourself: it was for your family." This technique seeks to establish rationalization by:

A.

Reducing Delta's stress about possibly being fired

B.

Claiming Delta's action was for altruistic reasons

C.

Reducing Delta's perception of the legal seriousness of the matter

D.

Establishing that Delta's family was being treated unfairly

Full Access
Question # 45

Which of the following is FALSE regarding link analysis?

A.

Link analysis is a poor tool to use for investigating a money laundering scheme

B.

Link analysis can be used to map connections between entities that share an address

C.

Link analysis helps identify indirect relationships with several degrees of separation

D.

Link analysis is an effective tool for demonstrating complex networks

Full Access
Question # 46

Divya, a Certified Fraud Examiner (CFE), is considering whether to commence a legal action to recover assets for her client. Of the following choices, which is the MOST IMPORTANT question for Divya to ask before moving forward with the legal action?

A.

“Does the defendant have sufficient money or property to satisfy a judgment?”

B.

“Has the suspect been arrested for any crimes in the past?”

C.

“What is the likelihood that the suspect did not actually commit fraud?”

D.

“Is there a relevant statute of limitations for the offense?”

Full Access
Question # 47

Gilbert is preparing to conduct a covert investigation. Before acting, he wants to wnte a memorandum documenting his plan. Which of the following pieces of information should he include in this memorandum?

A.

The information expected to be gained from the operation

B.

The identities of any confidential sources to be used in the operation

C.

His first impression regarding the subject's culpability

D.

All of the above

Full Access
Question # 48

Which of the following is INCORRECT with regard to locating individuals using online records?

A.

Before engaging in a search the fraud examine' should know the mod powerful and useful '>Des of searches

B.

If an individual has moved, obtaining a past address is usually of no help

C.

Online records are very useful in locating subjects whose whereabouts are unknown

D.

Obtaining a past address of the subject should be the first step in trying to locate a subject using online records.

Full Access
Question # 49

A law enforcement officer receives a reliable tip from an informant that a government employee is soliciting bribes in exchange for awarding contracts to the employee's agency. To investigate, the officer poses as a potential contractor and contacts the suspect employee about the possibility of getting a contract with the agency. During the conversation, the suspect demands a cash payment for the officer to be considered for upcoming contracts. If the suspect claims entrapment at trial, then which of the following is MOST LIKELY to occur?

A.

The suspect's claim will succeed because the investigator used deceit

B.

The suspect's claim will succeed because the investigator lacked probable cause

C.

The suspect's claim will fail because the investigator had adequate predication

D.

The suspect's claim will fail because the investigator is a law enforcement agent

Full Access
Question # 50

If your suspect is spending suspected illicit funds on consumables (e.g.. travel and entertainment) and you need to prove their illicit income circumstantially, which of the following methods of tracing assets would yield the BEST result?

A.

expenditures method

B.

The consumables method

C.

The income method

D.

The asset method

Full Access
Question # 51

Rachel, a fraud suspect, has decided to confess to Linda, a Certified Fraud Examiner (CFE). In obtaining a verbal confession from Rachel. Linda should obtain all of the following items of information EXCEPT:

A.

The approximate beginning and end dates of the fraud

B.

A statement from Rachel that her conduct was an accident

C.

A general estimate of the amount of money involved

D.

Rachel's motive for the offense

Full Access
Question # 52

Which of the following is an important factor that fraud examiners should consider when determining whether evidence should be disposed of after a fraud examination has concluded?

A.

Whether the evidence is digital or tangible

B.

Whether further litigation related to the case is likely to occur in the future

C.

Whether a summary of the evidence was included in a fraud examination report

D.

Whether the evidence is direct or circumstantial

Full Access
Question # 53

When a fraud examiner is conducting an examination and is in the process of collecting documents, the fraud examiner should:

A.

Dust all physical key documents for fingerprints

B.

Establish a document database early in the investigation

C.

Make copies of originals and leave the originals where they were found

D.

Organize all the documents obtained in chronological order

Full Access
Question # 54

Martin, a fraud examiner, is conducting an interview of Stephanie, a fraud suspect. Although Stephanie heard all of the questions during the introductory part of the interview, she began asking Martin to repeat almost every question when they became more focused If Stephanie is being deceptive, which of the choices below is MOST LIKELY the cause of Stephanie's behavior?

A.

Stephanie is testing Martin to determine whether he is able to ask consistent questions

B.

Stephanie is trying to make sure she understands the question so that she will not make a misstatement.

C.

Stephanie is delaying the answer so that she has more time to think of what to say.

D.

Stephanie is having trouble recalling the events or details related to Martin's questions.

Full Access